An effective SVD-based image tampering detection and self-recovery using active watermarking
暂无分享,去创建一个
Aboul Ella Hassanien | Sajjad Dadkhah | Somayeh Sadeghi | Yoshiaki Hori | Azizah Abd Manaf | A. Hassanien | A. A. Manaf | Y. Hori | S. Dadkhah | S. Sadeghi
[1] Xu Shu,et al. Research on image self-recovery algorithm based on DCT , 2010, J. Multim..
[2] Wen Gao,et al. An image fragile watermark scheme based on chaotic image pattern and pixel-pairs , 2007, Appl. Math. Comput..
[3] Héctor M. Pérez Meana,et al. Watermarking-based image authentication with recovery capability using halftoning technique , 2013, Signal Process. Image Commun..
[4] Banani Patra,et al. CRT-based fragile self-recovery watermarking scheme for image authentication and recovery , 2012, 2012 International Symposium on Intelligent Signal Processing and Communications Systems.
[5] Zhenxing Qian,et al. Watermarking With Flexible Self-Recovery Quality Based on Compressive Sensing and Compositive Reconstruction , 2011, IEEE Transactions on Information Forensics and Security.
[6] Shinfeng D. Lin,et al. Dual watermark for image tamper detection and recovery , 2008, Pattern Recognit..
[7] Chin-Chen Chang,et al. Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery , 2008, Pattern Recognit..
[8] Anthony Tung Shuen Ho,et al. Image Authentication Using Active Watermarking and Passive Forensics Techniques , 2011, Multimedia Analysis, Processing and Communications.
[9] Lung-Jen Wang,et al. A Wavelet-based Multipurpose Watermarking for Image Authentication and Recovery , 2013 .
[10] Edward J. Delp,et al. Detection of image alterations using semifragile watermarks , 2000, Electronic Imaging.
[11] Po-Whei Huang,et al. A hierarchical digital watermarking method for image tamper detection and recovery , 2005, Pattern Recognit..
[12] Azizah Abdul Manaf,et al. Efficient Digital Image Authentication and Tamper Localization Technique Using 3Lsb Watermarking , 2012 .
[13] Jeng-Shyang Pan,et al. Self Embedding Watermarking Scheme Using Halftone Image , 2008, IEICE Trans. Inf. Syst..
[14] Asifullah Khan,et al. Authentication and recovery of images using multiple watermarks , 2010, Comput. Electr. Eng..
[15] Nasir D. Memon,et al. Cryptanalysis of the Yeung - Mintzer fragile watermarking technique , 2002, J. Electronic Imaging.
[16] Yue Chen,et al. A novel chaos-based fragile watermarking for image tampering detection and self-recovery , 2013, Signal Process. Image Commun..
[17] Ching-Fen Jiang,et al. A COLOR IMAGE AUTHENTICATION AND RECOVERY METHOD USING BLOCK TRUNCATION CODE EMBEDDING , 2012 .
[18] Phen-Lan Lin. Digital watermarking models for resolving rightful ownership and authenticating legitimate customer , 2001, J. Syst. Softw..
[19] Jun-Dong Chang,et al. LBP-based fragile watermarking scheme for image tamper detection and recovery , 2013, 2013 International Symposium on Next-Generation Electronics.
[20] Nasir D. Memon,et al. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..
[21] Jianming Liu,et al. A novel fragile watermarking scheme for image tamper detection and recovery , 2010 .
[22] Anthony Tung Shuen Ho,et al. A semi-fragile pinned sine transform watermarking system for content authentication of satellite images , 2005, Proceedings. 2005 IEEE International Geoscience and Remote Sensing Symposium, 2005. IGARSS '05..
[23] Chin-Chen Chang,et al. A secure fragile watermarking scheme based on chaos-and-hamming code , 2011, J. Syst. Softw..
[24] Zhenxing Qian,et al. A Flexible Scheme of Self Recovery for Digital Image Protection , 2012 .
[25] Chun-Wei Yang,et al. Recover the tampered image based on VQ indexing , 2010, Signal Process..